911. Security patch management. (©2011) Other Names: Nicastro, Felicia M Record Type: Book Extent: 1 online resource (xiv, 259 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
912. Cyber security and policy : a substantive dialogue /: a substantive dialogue. (2017) Editors: Colarik, Andrew M; Jang-Jaccard, Julian; Mathrani, Anuradha Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
913. Python for secret agents : analyze, encrypt, and uncover intelligence data using python, the essential tool for all aspiring secret agents /: analyze, encrypt, and uncover intelligence data using python, the essential tool for all aspiring secret agents. (2014) Authors: Lott, Steven F Other Names: Blaminsky, Jarek cover designer. Record Type: Book Extent: 1 online resource (216 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
914. Honeypot : a new paradigm to information security /: a new paradigm to information security. (©2011) Other Names: Joshi, R. C; Sardana, Anjali Record Type: Book Extent: 1 online resource (xiv, 328 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
915. Security and policy driven computing. (©2011) Authors: Liu, Lei, 1968- Record Type: Book Extent: 1 online resource (xv, 274 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
916. Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually /: build intricate virtual architecture to practice any penetration testing technique virtually. (2014) Other Names: Cardwell, Kevin Record Type: Book Extent: 1 online resource (430 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
917. RC4 stream cipher and its variants. (©2012) Other Names: Paul, Goutam; Maitra, Subhamoy, 1970- Record Type: Book Extent: 1 online resource (xxv, 285 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
918. The security risk assessment handbook : a complete guide for performing security risk assessments /: a complete guide for performing security risk assessments. (©2011) Other Names: Landoll, Douglas J Record Type: Book Extent: 1 online resource (xix, 475 pages), illustrations, maps View Content: Available online (eLD content is only available in our Reading Rooms) ↗
919. Digital forensics explained. (©2013) Other Names: Gogolin, Greg Record Type: Book Extent: 1 online resource (xxi, 176 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
920. Kali Linux - Assuring Security by Penetration Testing : Master the Art of Penetration Testing with Kali Linux /: Master the Art of Penetration Testing with Kali Linux. (2014) Other Names: Allen, Lee; Heriyanto, Tedi; Ali, Shakeel Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗